Search criteria
246 vulnerabilities found for realplayer_sp by realnetworks
FKIE_CVE-2013-4974
Vulnerability from fkie_nvd - Published: 2013-08-27 03:34 - Updated: 2025-04-11 00:51
Severity ?
Summary
RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97CE27D2-C278-4B12-B1F2-A90A0A5C5FF3",
"versionEndIncluding": "16.0.2.32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E075E2D6-FE35-4310-8456-4DFAEF55F071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1FADAC-B763-410E-B8B3-FEC5BCB78912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "909306C9-D58F-40CF-9729-3B2ECC672203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"matchCriteriaId": "5B9B74FB-2236-402E-9999-C12F110C7621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20EC7F73-8C89-458C-954A-2A4F421DD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"matchCriteriaId": "671ACD3D-6B00-4BE1-80B1-BAAAEBFD22A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7AA87DB-F397-41B9-AEDA-268E0C427D40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.0.282:*:*:*:*:*:*:*",
"matchCriteriaId": "18B552F0-6997-48FF-BDCA-713F179D2CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A41C801F-BC97-49C8-8AD9-85836BB3FC92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file."
},
{
"lang": "es",
"value": "RealNetworks RealPlayer anterior a v16.0.3.51, y RealPlayer SP v1.0 hasta v1.1.5, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo con formato incorrecto de RealMedia."
}
],
"id": "CVE-2013-4974",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-08-27T03:34:35.917",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/61990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/61990"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4973
Vulnerability from fkie_nvd - Published: 2013-08-27 03:34 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97CE27D2-C278-4B12-B1F2-A90A0A5C5FF3",
"versionEndIncluding": "16.0.2.32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E075E2D6-FE35-4310-8456-4DFAEF55F071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1FADAC-B763-410E-B8B3-FEC5BCB78912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "909306C9-D58F-40CF-9729-3B2ECC672203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"matchCriteriaId": "5B9B74FB-2236-402E-9999-C12F110C7621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20EC7F73-8C89-458C-954A-2A4F421DD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"matchCriteriaId": "671ACD3D-6B00-4BE1-80B1-BAAAEBFD22A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7AA87DB-F397-41B9-AEDA-268E0C427D40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.0.282:*:*:*:*:*:*:*",
"matchCriteriaId": "18B552F0-6997-48FF-BDCA-713F179D2CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A41C801F-BC97-49C8-8AD9-85836BB3FC92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en RealNetworks RealPlayer anterior a v16.0.3.51, y RealPlayer SP v1.0 hasta v1.1.5, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo .rmp manipulado."
}
],
"id": "CVE-2013-4973",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-08-27T03:34:35.890",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/246524"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/61989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/246524"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/61989"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1750
Vulnerability from fkie_nvd - Published: 2013-03-20 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5554FAD5-F3FE-4CF9-993E-1F99E68E3067",
"versionEndIncluding": "16.0.0.282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E075E2D6-FE35-4310-8456-4DFAEF55F071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "37263B40-9C5F-49B5-8C97-D049ABBF4896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "F970382E-7657-470F-AB16-0C0F2120A300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B26737-8F00-4695-AD97-F64DFCA88374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1FADAC-B763-410E-B8B3-FEC5BCB78912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "909306C9-D58F-40CF-9729-3B2ECC672203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"matchCriteriaId": "5B9B74FB-2236-402E-9999-C12F110C7621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20EC7F73-8C89-458C-954A-2A4F421DD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"matchCriteriaId": "671ACD3D-6B00-4BE1-80B1-BAAAEBFD22A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:16.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7AA87DB-F397-41B9-AEDA-268E0C427D40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (\u0027heap\u0027) en RealNetworks RealPlayer anterior a v16.0.1.18 y RealPlayer SP v1.0 hasta v1.1.5 que permite a atacantes remotos ejecutar c\u00f3digo a trav\u00e9s de ficheros MP4 manipulados."
}
],
"id": "CVE-2013-1750",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-03-20T18:55:01.843",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-5690
Vulnerability from fkie_nvd - Published: 2012-12-19 11:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0476A423-8E57-4269-B305-2A24043A5786",
"versionEndIncluding": "16.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E075E2D6-FE35-4310-8456-4DFAEF55F071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1FADAC-B763-410E-B8B3-FEC5BCB78912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "909306C9-D58F-40CF-9729-3B2ECC672203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"matchCriteriaId": "5B9B74FB-2236-402E-9999-C12F110C7621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20EC7F73-8C89-458C-954A-2A4F421DD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"matchCriteriaId": "671ACD3D-6B00-4BE1-80B1-BAAAEBFD22A3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer."
},
{
"lang": "es",
"value": "RealNetworks RealPlayer antes de v16.0.0.282 y RealPlayer SP v1.0 a v1.1.5 permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo de RealAudio que activa el acceso a un puntero no v\u00e1lido.\r\n"
}
],
"id": "CVE-2012-5690",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-12-19T11:55:56.453",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-5691
Vulnerability from fkie_nvd - Published: 2012-12-19 11:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0476A423-8E57-4269-B305-2A24043A5786",
"versionEndIncluding": "16.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E075E2D6-FE35-4310-8456-4DFAEF55F071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1FADAC-B763-410E-B8B3-FEC5BCB78912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "909306C9-D58F-40CF-9729-3B2ECC672203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"matchCriteriaId": "5B9B74FB-2236-402E-9999-C12F110C7621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "20EC7F73-8C89-458C-954A-2A4F421DD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"matchCriteriaId": "671ACD3D-6B00-4BE1-80B1-BAAAEBFD22A3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer en RealNetworks RealPlayer antes de v16.0.0.282 y RealPlayer SP v1.0 a v1.1.5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo RealMedia modificado.\r\n"
}
],
"id": "CVE-2012-5691",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-12-19T11:55:56.500",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-3234
Vulnerability from fkie_nvd - Published: 2012-09-12 10:38 - Updated: 2025-04-11 00:51
Severity ?
Summary
RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24A1F8A8-87DF-4CE7-93F3-72DA6C1F084E",
"versionEndIncluding": "15.0.5.109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "320D3DA6-DD8C-4423-84E5-55906D47BD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "F970382E-7657-470F-AB16-0C0F2120A300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B26737-8F00-4695-AD97-F64DFCA88374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"matchCriteriaId": "299B9493-5498-4480-AD8C-EA7F0311CAD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file."
},
{
"lang": "es",
"value": "RealNetworks RealPlayer anterior a v15.0.6.14, RealPlayer SP 1.0 a 1.1.5 y Mac RealPlayer anterior a v12.0.1.1750 no tratan correctamente los tama\u00f1os de marco de codecs en archivos RealAudio, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (divisi\u00f3n por cero error y ca\u00edda de la aplicaci\u00f3n) o posiblemente tener un impacto no especificado a trav\u00e9s de un archivo dise\u00f1ado"
}
],
"id": "CVE-2012-3234",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-09-12T10:38:33.743",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-2410
Vulnerability from fkie_nvd - Published: 2012-09-12 10:38 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24A1F8A8-87DF-4CE7-93F3-72DA6C1F084E",
"versionEndIncluding": "15.0.5.109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "320D3DA6-DD8C-4423-84E5-55906D47BD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "F970382E-7657-470F-AB16-0C0F2120A300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B26737-8F00-4695-AD97-F64DFCA88374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"matchCriteriaId": "299B9493-5498-4480-AD8C-EA7F0311CAD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en RealPlayer de RealNetworks anterior a v15.0.6.14, RealPlayer SP 1.0 a 1.1.5 y Mac RealPlayer anterior a v12.0.1.1750, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de un archivo de RealMedia artesanal, una vulnerabilidad diferente a CVE-2012-2409."
}
],
"id": "CVE-2012-2410",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-09-12T10:38:33.710",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-2409
Vulnerability from fkie_nvd - Published: 2012-09-12 10:38 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24A1F8A8-87DF-4CE7-93F3-72DA6C1F084E",
"versionEndIncluding": "15.0.5.109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "320D3DA6-DD8C-4423-84E5-55906D47BD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "F970382E-7657-470F-AB16-0C0F2120A300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B26737-8F00-4695-AD97-F64DFCA88374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"matchCriteriaId": "299B9493-5498-4480-AD8C-EA7F0311CAD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en RealNetworks RealPlayer anterior a v15.0.6.14, RealPlayer SP 1.0 a 1.1.5 y Mac RealPlayer anterior a v12.0.1.1750, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de un archivo de RealMedia artesanal, una vulnerabilidad diferente a CVE-2012-2410."
}
],
"id": "CVE-2012-2409",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-09-12T10:38:33.663",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-2407
Vulnerability from fkie_nvd - Published: 2012-09-12 10:38 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24A1F8A8-87DF-4CE7-93F3-72DA6C1F084E",
"versionEndIncluding": "15.0.5.109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "320D3DA6-DD8C-4423-84E5-55906D47BD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "F970382E-7657-470F-AB16-0C0F2120A300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B26737-8F00-4695-AD97-F64DFCA88374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"matchCriteriaId": "299B9493-5498-4480-AD8C-EA7F0311CAD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en RealNetworks RealPlayer anterior a v15.0.6.14, RealPlayer SP 1.0 a 1.1.5 y Mac RealPlayer anterior a v12.0.1.1750, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de un archivo AAC que no se utilizan con cuidado en la corriente de datos desembalaje."
}
],
"id": "CVE-2012-2407",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-09-12T10:38:33.523",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-2408
Vulnerability from fkie_nvd - Published: 2012-09-12 10:38 - Updated: 2025-04-11 00:51
Severity ?
Summary
The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24A1F8A8-87DF-4CE7-93F3-72DA6C1F084E",
"versionEndIncluding": "15.0.5.109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "320D3DA6-DD8C-4423-84E5-55906D47BD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"matchCriteriaId": "8374739F-8F46-4B07-9432-4A38BCC3E836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "871CD3B2-ABAE-4B9E-89AE-FB6848D7A696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "111E5B3F-513E-4BEE-8B32-7A9404F97C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0301EF-960C-475F-A2A0-5410CA17CBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A155A338-93F2-4D58-B825-E2D3F88C3C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"matchCriteriaId": "D8FC5594-3C28-417F-B621-C29E3E2D60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2C4FD-DAB6-4D38-9B30-C51CC17444D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A1E94D-E25C-4888-9FDE-207FEC5FD370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"matchCriteriaId": "1E454E6F-6229-4538-8B64-B16FA1F97F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A25BC2-1677-43A4-92CA-A971109DE08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AA21F1-EB31-4D62-B43C-FE8887AA6D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "F970382E-7657-470F-AB16-0C0F2120A300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:15.0.3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B26737-8F00-4695-AD97-F64DFCA88374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"matchCriteriaId": "299B9493-5498-4480-AD8C-EA7F0311CAD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding."
},
{
"lang": "es",
"value": "El AAC SDK en RealNetworks RealPlayer anterior a v15.0.6.14, RealPlayer SP 1.0 a 1.1.5 y Mac RealPlayer anterior a v12.0.1.1750 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria heap) o posiblemente tener un impacto no especificado a trav\u00e9s de un elaborado AAC archivo que no se utilizan con cuidado durante la decodificaci\u00f3n."
}
],
"id": "CVE-2012-2408",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-09-12T10:38:33.617",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2013-4974 (GCVE-0-2013-4974)
Vulnerability from cvelistv5 – Published: 2013-08-27 01:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:41.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "61990",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61990"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-12T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "61990",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61990"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "61990",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61990"
},
{
"name": "http://service.real.com/realplayer/security/08232013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4974",
"datePublished": "2013-08-27T01:00:00",
"dateReserved": "2013-07-29T00:00:00",
"dateUpdated": "2024-08-06T16:59:41.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4973 (GCVE-0-2013-4973)
Vulnerability from cvelistv5 – Published: 2013-08-27 01:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:41.224Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "61989",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61989"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"name": "VU#246524",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/246524"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-12T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "61989",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61989"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"name": "VU#246524",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/246524"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4973",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "61989",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61989"
},
{
"name": "http://service.real.com/realplayer/security/08232013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"name": "VU#246524",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/246524"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4973",
"datePublished": "2013-08-27T01:00:00",
"dateReserved": "2013-07-29T00:00:00",
"dateUpdated": "2024-08-06T16:59:41.224Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1750 (GCVE-0-2013-1750)
Vulnerability from cvelistv5 – Published: 2013-03-20 18:00 – Updated: 2024-09-16 22:40
VLAI?
Summary
Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:13:32.373Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-20T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-1750",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/03152013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-1750",
"datePublished": "2013-03-20T18:00:00Z",
"dateReserved": "2013-02-15T00:00:00Z",
"dateUpdated": "2024-09-16T22:40:03.403Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5690 (GCVE-0-2012-5690)
Vulnerability from cvelistv5 – Published: 2012-12-19 11:00 – Updated: 2024-09-16 17:08
VLAI?
Summary
RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:14:16.428Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-12-19T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-5690",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/12142012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-5690",
"datePublished": "2012-12-19T11:00:00Z",
"dateReserved": "2012-10-29T00:00:00Z",
"dateUpdated": "2024-09-16T17:08:26.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5691 (GCVE-0-2012-5691)
Vulnerability from cvelistv5 – Published: 2012-12-19 11:00 – Updated: 2024-09-16 20:32
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:14:16.401Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-12-19T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-5691",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/12142012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-5691",
"datePublished": "2012-12-19T11:00:00Z",
"dateReserved": "2012-10-29T00:00:00Z",
"dateUpdated": "2024-09-16T20:32:36.375Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3234 (GCVE-0-2012-3234)
Vulnerability from cvelistv5 – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:57
VLAI?
Summary
RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:57:50.255Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"name": "realplayer-frame-size-dos(78388)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"name": "realplayer-frame-size-dos(78388)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3234",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"name": "realplayer-frame-size-dos(78388)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3234",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-06-06T00:00:00",
"dateUpdated": "2024-08-06T19:57:50.255Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2407 (GCVE-0-2012-2407)
Vulnerability from cvelistv5 – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:24.304Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "realplayer-aac-data-bo(78384)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "realplayer-aac-data-bo(78384)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2407",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "realplayer-aac-data-bo(78384)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2407",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:24.304Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2409 (GCVE-0-2012-2409)
Vulnerability from cvelistv5 – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:25.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "real-realplayer-realmedia-bo(78386)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "real-realplayer-realmedia-bo(78386)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2409",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "real-realplayer-realmedia-bo(78386)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2409",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:25.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2408 (GCVE-0-2012-2408)
Vulnerability from cvelistv5 – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:25.814Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "realplayer-aacsdk-code-exec(78385)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "realplayer-aacsdk-code-exec(78385)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "realplayer-aacsdk-code-exec(78385)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2408",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:25.814Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2410 (GCVE-0-2012-2410)
Vulnerability from cvelistv5 – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:25.309Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "realplayer-realmedia-files-bo(78387)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "realplayer-realmedia-files-bo(78387)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2410",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "realplayer-realmedia-files-bo(78387)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2410",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:25.309Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4974 (GCVE-0-2013-4974)
Vulnerability from nvd – Published: 2013-08-27 01:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:41.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "61990",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61990"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-12T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "61990",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61990"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed RealMedia file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "61990",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61990"
},
{
"name": "http://service.real.com/realplayer/security/08232013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4974",
"datePublished": "2013-08-27T01:00:00",
"dateReserved": "2013-07-29T00:00:00",
"dateUpdated": "2024-08-06T16:59:41.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4973 (GCVE-0-2013-4973)
Vulnerability from nvd – Published: 2013-08-27 01:00 – Updated: 2024-08-06 16:59
VLAI?
Summary
Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:41.224Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "61989",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61989"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"name": "VU#246524",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/246524"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-12T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "61989",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61989"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"name": "VU#246524",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/246524"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4973",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "61989",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61989"
},
{
"name": "http://service.real.com/realplayer/security/08232013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/08232013_player/en/"
},
{
"name": "VU#246524",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/246524"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4973",
"datePublished": "2013-08-27T01:00:00",
"dateReserved": "2013-07-29T00:00:00",
"dateUpdated": "2024-08-06T16:59:41.224Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1750 (GCVE-0-2013-1750)
Vulnerability from nvd – Published: 2013-03-20 18:00 – Updated: 2024-09-16 22:40
VLAI?
Summary
Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:13:32.373Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-20T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-1750",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in RealNetworks RealPlayer before 16.0.1.18 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a malformed MP4 file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/03152013_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/03152013_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-1750",
"datePublished": "2013-03-20T18:00:00Z",
"dateReserved": "2013-02-15T00:00:00Z",
"dateUpdated": "2024-09-16T22:40:03.403Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5690 (GCVE-0-2012-5690)
Vulnerability from nvd – Published: 2012-12-19 11:00 – Updated: 2024-09-16 17:08
VLAI?
Summary
RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:14:16.428Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-12-19T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-5690",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allow remote attackers to execute arbitrary code via a RealAudio file that triggers access to an invalid pointer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/12142012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-5690",
"datePublished": "2012-12-19T11:00:00Z",
"dateReserved": "2012-10-29T00:00:00Z",
"dateUpdated": "2024-09-16T17:08:26.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5691 (GCVE-0-2012-5691)
Vulnerability from nvd – Published: 2012-12-19 11:00 – Updated: 2024-09-16 20:32
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:14:16.401Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-12-19T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-5691",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 16.0.0.282 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted RealMedia file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/12142012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/12142012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-5691",
"datePublished": "2012-12-19T11:00:00Z",
"dateReserved": "2012-10-29T00:00:00Z",
"dateUpdated": "2024-09-16T20:32:36.375Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3234 (GCVE-0-2012-3234)
Vulnerability from nvd – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:57
VLAI?
Summary
RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:57:50.255Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"name": "realplayer-frame-size-dos(78388)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"name": "realplayer-frame-size-dos(78388)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3234",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 do not properly handle codec frame sizes in RealAudio files, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) or possibly have unspecified other impact via a crafted file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
},
{
"name": "realplayer-frame-size-dos(78388)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78388"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3234",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-06-06T00:00:00",
"dateUpdated": "2024-08-06T19:57:50.255Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2407 (GCVE-0-2012-2407)
Vulnerability from nvd – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:24.304Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "realplayer-aac-data-bo(78384)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "realplayer-aac-data-bo(78384)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2407",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "realplayer-aac-data-bo(78384)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2407",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:24.304Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2409 (GCVE-0-2012-2409)
Vulnerability from nvd – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:25.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "real-realplayer-realmedia-bo(78386)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "real-realplayer-realmedia-bo(78386)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2409",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2410."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "real-realplayer-realmedia-bo(78386)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2409",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:25.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2408 (GCVE-0-2012-2408)
Vulnerability from nvd – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:25.814Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "realplayer-aacsdk-code-exec(78385)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "realplayer-aacsdk-code-exec(78385)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "realplayer-aacsdk-code-exec(78385)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2408",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:25.814Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2410 (GCVE-0-2012-2410)
Vulnerability from nvd – Published: 2012-09-12 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:34:25.309Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "realplayer-realmedia-files-bo(78387)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "realplayer-realmedia-files-bo(78387)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2410",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted RealMedia file, a different vulnerability than CVE-2012-2409."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "realplayer-realmedia-files-bo(78387)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78387"
},
{
"name": "http://service.real.com/realplayer/security/09072012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/09072012_player/en/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2410",
"datePublished": "2012-09-12T10:00:00",
"dateReserved": "2012-04-23T00:00:00",
"dateUpdated": "2024-08-06T19:34:25.309Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}